Understanding the Threat
Phishing attacks targeting darknet market users are sophisticated, well-funded, and extremely common. Attackers create near-perfect replicas of legitimate markets — same design, same layout, same content — but with a fake onion address. When users enter their credentials, the attacker captures them instantly.
Common distribution methods for phishing links include: Reddit, Telegram groups, Discord servers, clearnet "directory" sites, Google search results (fake SEO), and direct messages from impersonators. Even sites that look like trustworthy directories may be specifically created to distribute phishing links.
The financial consequences can be total: attackers drain wallets, sell captured accounts, and in some cases use compromised accounts to conduct scams against other users.
🚨 If You Suspect You've Been Phished
Immediately: Do NOT log into the real market with the same credentials. Change all passwords. Move any funds in your market wallet to a fresh wallet address immediately. Contact market support through a verified channel.
The Golden Rules of Anti-Phishing
Use Only Verified Onion Links
The safest source for TorZon onion links is this page (torzon1market.net/lgn/) or a PGP-signed announcement from the market's verified key. Every other source — Reddit, Telegram, other "directories" — must be treated as a potential phishing vector until independently verified via PGP.
Verify Every Single Character of the Onion URL
V3 onion addresses are 56 characters long. Phishing sites typically differ from genuine addresses by as few as 1-3 characters. Before entering any credentials, compare the full address character-by-character against the verified address. This is tedious but essential.
Verify PGP Signatures on All Announcements
Any official TorZon announcement about new mirror links, changes, or features should be signed with the market's PGP key. Import the key (available on our access page) and verify the signature before acting on any announcement. Unsigned announcements should be treated with extreme suspicion.
Bookmark Verified Links — Never Search
Search engines may index phishing sites that are optimized for the same keywords as genuine markets. After verifying a TorZon onion URL, bookmark it immediately in Tor Browser. All future visits should use only that bookmark — never a fresh search.
Use a Unique, Secure Password
If you do fall victim to a phishing attack, having a unique password means the attacker cannot use your credentials on any other platform. Use a randomly generated 20+ character password stored only in your head or an encrypted password manager. Never reuse passwords across platforms.
Enable 2FA (If Available)
Some darknet markets support TOTP (Time-based One-Time Password) two-factor authentication. If available, enable it. A phished password without the TOTP token cannot be used to log in. Use a TOTP app like Aegis (Android) rather than SMS-based 2FA.
How to Identify a Phishing Site
| Check | Legitimate Site | Phishing Site |
|---|---|---|
| URL length | 56 characters (.onion) | Often different length or characters |
| Clearnet URL | None — only .onion | May have clearnet version too |
| PGP signature | Verifiable against official key | Cannot verify or missing |
| URL source | From verified source or PGP-signed | From forum, Telegram, search |
| Login response | Takes time, shows captcha | May accept any credentials |
| Wallet address | Unique per deposit | May show one fixed address |
| PGP communication | Signed messages from staff | No PGP or unverifiable keys |
The Most Common Phishing Vectors
Reddit & Forums
- Fake subreddits mimicking official ones
- Pinned posts with "updated" links
- Helpful users sharing "working" links
- Mods who are actually phishers
Telegram & Discord
- Fake official market groups
- Bots DMing link updates
- Support impersonators
- Groups posing as harm reduction resources
Clearnet Directories
- Sites claiming to list "official" onion URLs
- Look legitimate but list fake links
- High Google rankings for relevant terms
- Even this site must be verified via PGP
Impersonation
- DMs from fake market admins
- Emails from "market support"
- Vendor impersonators with fake stores
- Fake "account verification" requests
Resources
Tor Project — Verifying Tor Browser
Learn how to verify the cryptographic signature of Tor Browser downloads to avoid tampered versions.
GnuPG — PGP Verification Tool
Free, open-source PGP encryption and signature verification tool. Available for Windows, Linux, and macOS.
EFF Surveillance Self-Defense — Phishing Guide
Comprehensive guide to recognizing and avoiding phishing attacks from the Electronic Frontier Foundation.
